Multi-party privacy computing system based on trusted execution environment

A computing system and execution environment technology, applied in the field of privacy computing, can solve problems such as not being very good

Inactive Publication Date: 2020-06-02
杭州宇链科技有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no good solution to these probl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose and technical solution of the present invention clearer, the present invention will be further described in detail below in conjunction with examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. The application process of the present invention will be described in detail below.

[0019] A multi-party privacy computing system based on a trusted execution environment, characterized in that the computing system includes devices connected to the computing system; the data computing system is used to receive the original data provided by the original data provider and Processing and analyzing the raw data to obtain a data analysis result; the device extracts the data analysis result from the computing system and sends the data analysis result to a specified object; Credit to extract and send data analysis results.

[0020] Further, the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure and credible data multi-party computation implementation mode under the condition that a plurality of participants exist. By adopting the computing system provided bythe invention, a provider of the original data can clearly know which objects acquires the provided original data , in what way the provided original data is acquired, and whether unauthorized use orpropagation exists in an analysis process and an analysis result of the original data or not; and a data demander can also ensure the accuracy and authenticity of the original data and the data calculation result. According to the computing system, the original data needing to be protected and the computing program are placed in a specified trusted execution environment for data sharing, and underthe condition that multi-party data computing and privacy protection requirements exist, the technical scheme can well solve the safety problem concerned by all parties in the multi-party data computing problem.

Description

technical field [0001] The invention belongs to the technical field of privacy computing, and relates to a multi-party privacy computing system based on a trusted execution environment. Background technique [0002] At present, industry data sharing and data analysis have become the general trend, especially for the creation of digital government, government big data needs to obtain and analyze government-related data from all walks of life. The biggest challenges in data sharing and data analysis are privacy and performance, and these two challenges are difficult to solve at the same time. Most solutions are to exchange privacy by losing performance, or pursue performance without much consideration for privacy. Common encryption technologies to solve privacy problems, such as homomorphic encryption (Homomorphic encryption) and zero-knowledge proof (Zero-knowledge proof), have high complexity, poor versatility, and may cause serious performance loss. [0003] In terms of pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3268H04L63/0428
Inventor 黄佳磊程希冀
Owner 杭州宇链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products